نتایج جستجو برای: social infrastructures

تعداد نتایج: 623173  

2010
P. A. J. van Oort G. W. Hazeu H. Kramer A. K. Bregt

Data sharing over the internet is increasingly efficient and increasingly anonymous. This growing anonymity makes it difficult for data users to exchange feedback: interesting ideas, innovations, ancillary data, concerns about data quality, etcetera. For data producers not knowing the end-users makes it more difficult to collect end-user feedback and tailor the production process to users needs...

2005
Uri Gal Youngjin Yoo Richard J. Boland

This paper takes a dynamic approach to understanding the nature and role of boundary objects by examining them in relation to the social infrastructures within which they are embedded and to the social identities of the groups that share them. It explores the premise that boundary objects are used not only as a translation device, but also as a resource to form and express social identities. It...

Journal: :Scandinavian J. Inf. Systems 2002
Susan Leigh Star

By bringing together science studies, information science and ethnographic fieldwork in interdisciplinary research the author argues for the relevance of ethnographic practices when studying information systems as infrastructures of communication. Ethnographic fieldwork focuses attention on fringes and materialities of infrastructures and renders the researcher able to read the invisible layers...

Journal: :IJCIS 2008
Wenjun Chris Zhang X. Liu Choon-Lee Chai Ralph Deters Dong Liu Dmytro Dyachuk Y. L. Tu Zaheer Baber

Interdependency among critical infrastructures contributes to vulnerabilities of those infrastructures. In this paper, the vulnerabilities of critical infrastructures are identified and analysed using social network analysis. In the analysis of network centrality, the importance of each critical infrastructure, in terms of its contribution to infrastructure interdependency, is ranked. The findi...

2011
Nishanth R. Sastry

ly, the Pocket Switched Network can be thought of as a temporally evolving contact graph. Each contact corresponds to a momentary undirected edge and involves a two-way data exchange between the node pair involved. Edges appear and disappear according to some underlying stochastic process that corresponds to the social contacts. The key insight behind the concept of pocket switching is that by ...

2014
Evangelos Anifantis Eleni Stai Vasileios Karyotis Symeon Papavassiliou

The observed unbalance of spectrum utilization combined with the proliferation of wireless devices and the growth of online social networks call for a joint study of cognitive radios (CRs) and social networking towards improving the operation of both the underlying CR-capable communications infrastructures and of the corresponding dynamic networks. In this work, we address such issue and focus ...

Journal: :Ergonomics 2014
Chris W Johnson

We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing...

2017
Uri Gal Youngjin Yoo

This paper takes a dynamic approach to understanding the nature and role of boundary objects by examining them in relation to the social infrastructures within which they are embedded and to the social identities of the groups that share them. We present a case study that describes the introduction of 3D modelling technologies into the AEC industry and the changes that consequently occurred. Ba...

2010
Erhan J. Kartaltepe Jose Andre Morales Shouhuai Xu Ravi S. Sandhu

Botnets have become a major threat in cyberspace. In order to effectively combat botnets, we need to understand a botnet’s Command-and-Control (C&C), which is challenging because C&C strategies and methods evolve rapidly. Very recently, botmasters have begun to exploit social network websites (e.g., Twitter.com) as their C&C infrastructures, which turns out to be quite stealthy because it is ha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید